Access Control System
The access control and management system (ACS) is a system designed to control access to a given territory of certain objects (people, vehicles) at certain time intervals with or without identification of objects. A correctly selected, installed and configured access control system can save the company management from security problems and save money.
The need to implement access control and management systems at facilities is caused by two main reasons:
• Providing protection against penetration of persons who do not have appropriate access rights, as well as cases of criminal encroachment on people’s lives, theft of material assets and information resources
• Creation of conditions for increasing labor discipline and efficient use of working time
Restricting access to visitors and accounting for staff time
Ensuring the safety of visitors and staff + maintaining a base
Automobile access control with license plate identification
Restricting access to visitors and accounting for staff time
Ensuring the safety of visitors and staff + maintaining a base
Automobile access control with license plate identification
Elements and Benefits of ACS
ACS functioning process
An electronic key (identifier) is made for employees, visitors and customers of the company in the form of a plastic card or key fob with an individual code. They are issued with the simultaneous entry of personal information in the card file. Card files are organized in the form of electronic databases in which the identifier is associated with personal information. Readers are installed at the entrance to rooms with limited access. The system compares the information received from the reader and the situation in which this information was received and sends an enable or disable signal to the device, as a result, doors / turnstiles open or block. Also, the system can activate the function of switching the room into the alarm mode using specially installed buttons. Each fact that the reader is activated is recorded in the controller and a history (log) is kept, it is usually saved on the hard drive in the computer in a form that allows using the special software to obtain the necessary information – reports on accounting of working hours, violations of labor discipline and others.
Basically, enterprises have four types of access control points. These are checkpoints, premises of special importance, office premises and entrances / exits of vehicles. Access control systems can work in standalone or network modes. Integrated access control systems are so multifunctional that they can provide not only safety and discipline, but also automate the security guard’s workplace, as well as establish personnel and accounting systems.